This timely book provides broad coverage of security and privacy issues in the macro and micro perspective. In macroperspective, the system and algorithm fundamentals of next-generation 
本書全面系統地講解了Linux系統的相關知識。全書由4部分(基礎篇、系統篇、網絡篇及開發篇)共17章組成,具體包括Linux概述、Red Hat Linux 9安裝、Linux常用命令、Linux文本編輯、Linux桌面環境、用戶管理、設備管理、文件系統管理、進程管理、日誌文件管理、TCP/IP網絡設置、Apache Web服務器、文件傳輸服務器、網絡服務器簡介、Linux編程概述、Linux語言
This book adopts a systematic view of the control systems in cyber-physical systems including the security control of the optimal control system, security control of the non-cooperative game system, q
Linux是當今主要的Internet服務器平臺。系統管理員和Web開發者需要熟諳Linux,深入掌握shell和命令行知識;由著名Linux專家Mark G. Sobell撰寫的卓越經典書籍《Linux命令行與shell編程實戰(第4版)》涵蓋Linux的方方面面,將幫助你達成上述目標,成為Linux專家。《Linux命令行與shell編程實戰(第4版)》將全面深入地介紹系統管理員、開發者以及高
Linux distributions are widely used by technical professionals to support mission-critical applications and manage crucial data. But safeguarding Linux systems can be complex, and many guides to Linux
An information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of
While the American alliance system in Asia has been fundamental to the region's security and prosperity for seven decades, today it encounters challenges from the growth of China-based regional organi
This volume offers a coherent analysis of the European Union’s security strategies within a comparative framework.If the EU is to survive and prosper as an effective security actor, it requires that g
Makes it easy for small- to medium–sized businesses to enter the world of zero–cost software running on Linux and covers all the distros you might want to use, including Red Hat, Ubuntu, Debian, and C
To be competitive, an organization needs to reach modern standards of scalability and high availability. While Linux is an option, it's painful to deal with the frequent operating system updates and c
In this thought-provoking book, Paul Spicker challenges readers to rethink social security benefits in Britain. Putting a case for reform of the system, Spicker argues that most of the criticisms made
Over the past five years, the EU has established a new system of diplomacy centred on the European External Action Service (EEAS) and the High Representative for Foreign Affairs and Security Policy. T
This report explores the creation of a U.S. Department of Defense (DoD) system for security cooperation assessment, monitoring, and evaluation (AME) by analyzing existing AME practices inside and outs
本書涵蓋 Linux 核心及模組的編譯流程,接著說明其檔案系統、資料結構、事件管理及 IRQ 等概念。並分門別類陳述諸如網路、輸入、I2C、PCI、USB 等領域之驅動程式設計。目錄01 Linux 核心組成和機制02 Linux 核心裝置管理方式03 Linux 驅動開發基礎04 Linux 字元裝置驅動開發05 Linux 核心中斷機制06 Linux 區塊裝置驅動開發07 Linux 網路裝
Discover the latest information for working on Windows, Mac OS, and UNIX/Linux platforms with GUIDE TO OPERATING SYSTEMS, 5E. You examine operating system theory, installation, upgrading, configuring
本書以目前非常流行的Red Hat Enterprise Linux 6.5為藍本,全面介紹了Linux的基本管理、系統維護及網路配置等相關知識。本書從實用的角度出發,主要以終端命令方式介紹Linux系統的操作及管理方法。 全書內容共分為9章,主要包括Linux概述、Linux的安裝、Linux基本命令的使用、Linux系統中用戶與組的概念及相關操作、Linux檔系統的管理、進程與作業的相關操作及
The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicat
The Raspberry Pi is a small, low-cost computing platform that can be adapted for 1000s of electronic applications. It can use the free Linux operating system, which allows it to do very complex tasks,
本書以Red Hat Linux Enterprise Linux 5(5以上版本均可)為平臺,對Linux基礎性知識點進行全面而又詳細的介紹。本書根據初學者的學習規律,先介紹作業系統引論、Linux的運行模式、 Linux檔和磁片系統、Linux使用者管理、 Linux的shell程式、 Linux網路配置、Linux系統安全的基本操作及簡單原理,然後在此基礎之上以進程管理和存儲管理為例來提升L
Is our system of social security, which involves an annual dispersement of thirty billion dollars, as effective and as equitable as it might be? J. Douglas Brown's analysis of the policies of this pro
Increasingly the Middle East and its growing population face a highly complex and fragile security system. The rich deposits of natural resources, such as oil and gas, suffer from a strained renewable
Increasingly the Middle East and its growing population face a highly complex and fragile security system. The rich deposits of natural resources, such as oil and gas, suffer from a strained renewable
Today high volumes of spam not only waste resources and impede productivity, but also present severe threats to computer system security and personal privacy. This book introduces research on anti-spa
Linux... Master It Today!This book will teach you how to use Linux operating systems. After reading this material, you’ll be able to use Linux for both basic and advanced purposes. Aside from explaini
This is Linux for those of us who don’t mind typing. All Linux users and administrators tend to like the flexibility and speed of Linux administration from the command line in byte–sized chunks, inste
This fully-updated, integrated self-study system offers complete coverage of the revised 2015 Systems Security Certified Practitioner (SSCP) exam domainsThoroughly revised for the April 2015 exam upda